ruchikagargdiwakar / ml_cyber_security_usecasesView external linksLinks
This project contains files for cyber security
☆36Dec 17, 2018Updated 7 years ago
Alternatives and similar repositories for ml_cyber_security_usecases
Users that are interested in ml_cyber_security_usecases are comparing it to the libraries listed below
Sorting:
- Projects that show my knowledge and experience of Cyber Security.☆15Jan 27, 2022Updated 4 years ago
- InSpec profile to validate the secure configuration of Red Hat Enterprise Linux 7, against DISA's Red Hat Enterprise Linux 7 Security Tec…☆15Dec 15, 2025Updated 2 months ago
- ☆16Jan 5, 2017Updated 9 years ago
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Jan 29, 2021Updated 5 years ago
- Experimental ONLY: This consolidated data of scenario-2 of the US-CERT dataset for insider threats to be used with TF 2.0 and Keras☆20Apr 28, 2022Updated 3 years ago
- My graduation project☆11Feb 16, 2022Updated 4 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆219Apr 25, 2024Updated last year
- 图像分类系统,采用HOG+SVM/Sotfmax分类器,神经网络采用卷积神经网络和34层的深度参查网络,利用基于tensorflow的tflearn实现。☆10May 23, 2017Updated 8 years ago
- This is for Meridian (Traditional Chinese Medicine conception) prediction by machining learning method.☆11Sep 30, 2019Updated 6 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Online Comment Toxicity Analysis using averaging the Classifiers and used both char level as well as word level n-grams.☆10Mar 31, 2018Updated 7 years ago
- ☆11Mar 31, 2022Updated 3 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- Code used in Tiukhova et al. (2022). Influencer Detection with Dynamic Graph Neural Networks. TGL@Neurips 2022.☆10Feb 9, 2023Updated 3 years ago
- Matlab code of the proposed hybrid DGA method for power transformer fault diagnosis.☆11Apr 9, 2023Updated 2 years ago
- An IdaPython tool for getting syscall's ID and function name from ntdll.dll, user32.dll, and so on.☆13Oct 2, 2016Updated 9 years ago
- multi-cluster gateway controller, manages multi-cluster gateways based on gateway api and policy attachment☆11Dec 11, 2024Updated last year
- h5涂色小游戏☆12Jan 1, 2023Updated 3 years ago
- Netcap Tensorflow Deep Neural Network☆15Apr 26, 2020Updated 5 years ago
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Aug 4, 2025Updated 6 months ago
- Chitrarth: Bridging Vision and Language for a Billion People☆13Feb 12, 2025Updated last year
- A small database to test different machine learning tasks. It contains simple shapes of different colors.☆11Sep 18, 2022Updated 3 years ago
- Tutorial on TikZ☆14Nov 15, 2024Updated last year
- This repository contains comprehensive pricing and configuration data for LLMs. It powers cost attribution for 200+ enterprises running 4…☆52Updated this week
- Generate fake data for any purpose☆10Dec 21, 2020Updated 5 years ago
- An open source tool chain to simulate cyber attacks in the power system☆12May 4, 2017Updated 8 years ago
- Modeling, Visualization and Voltage Stability Analysis of Nordic-32, 64 bus power systems using GridCal and NetworkX.☆10May 6, 2020Updated 5 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Official Writeups for scriptCTF 2025☆14Aug 27, 2025Updated 5 months ago
- Rodrigo Rianelly's graduation project about "Distributed photovoltaic generation impact on fault location in radial distribution networks…☆10Oct 23, 2020Updated 5 years ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- Free and Open Platform for AI-assisted Computing☆10May 19, 2019Updated 6 years ago
- Codes for the Nature Conservancy Fish classification challenge☆10Jan 2, 2017Updated 9 years ago
- An archive of BASHLITE source code☆11Oct 29, 2016Updated 9 years ago
- Shell escape a string to safely use it as a token in a shell command (backport of Python shlex.quote)☆16Apr 29, 2021Updated 4 years ago
- In this project, we need to find out commercial products listed on Google that refer to the same entity across Amazon by comparing the si…☆11Nov 7, 2016Updated 9 years ago
- Stanford CoreNLP NER addon for Apache Tika's NamerEntityParser☆13Feb 26, 2022Updated 3 years ago
- SQL injection detection engine by tokenzing and syntax analysis, like SQLChop☆10May 8, 2017Updated 8 years ago